Changes

Line 23: Line 23:  
===[[cybercrime|Common Scams]]===
 
===[[cybercrime|Common Scams]]===
 
*Impersonating ICANN or an ICANN-accredited registrar, and sending fake renewal emails in an attempt to collect a payment.
 
*Impersonating ICANN or an ICANN-accredited registrar, and sending fake renewal emails in an attempt to collect a payment.
*Conducting [[phishing]] attacks that trick registrants into revealing login information to try and take control of the domain.
+
*Conducting [[phishing]] attacks that trick registrants into revealing login information to try and [[Domain Name Hijacking|take control of the domain]].
 
*Convincing you via fraudulent means to buy a domain name under a different top-level domain name at a higher price.<ref>[https://www.icann.org/en/system/files/files/help-keep-domain-name-secure-30sep20-en.pdf Domain Name Security, ICANN Org]</ref>
 
*Convincing you via fraudulent means to buy a domain name under a different top-level domain name at a higher price.<ref>[https://www.icann.org/en/system/files/files/help-keep-domain-name-secure-30sep20-en.pdf Domain Name Security, ICANN Org]</ref>
===Compromised Domains===
      +
===[[Compromised Domain]]s===
 +
A compromised website indicates that a [[Threat Actor]] has control over the website and is not the official registrant of the domain itself. A domain name that has been registered for a legitimate or benign purpose but whose website has been compromised will generally have:
 +
* viewable content related to the domain name,
 +
* been renewed or registered for longer than 1 year, and
 +
* a content management system (like Wordpress) that is visible in the URL.<ref>[https://dnsabuseinstitute.org/best-practices-identification-mitigation-of-dns-abuse/ Best practices for Identifying and Mitigating DNS Abuse, DNS Abuse Institute]</ref>
    
==References==
 
==References==
Bureaucrats, Check users, lookupuser, Administrators, translator
14,932

edits